RHSA-2020:4316

Vulnerability from csaf_redhat - Published: 2020-10-22 19:41 - Updated: 2025-11-21 18:17
Summary
Red Hat Security Advisory: java-11-openjdk security and bug fix update
Severity
Moderate
Notes
Topic: An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) * OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) * OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) * OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) * OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) * OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) * OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * java-11-openjdk property java.vendor is "N/A" (BZ#1873388)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).

CWE-319 - Cleartext Transmission of Sensitive Information
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

CWE-295 - Improper Certificate Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).

CWE-190 - Integer Overflow or Wraparound
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316

Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. https://access.redhat.com/errata/RHSA-2020:4316
References
https://access.redhat.com/errata/RHSA-2020:4316 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1873388 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889271 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889274 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889280 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889290 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889697 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889717 external
https://bugzilla.redhat.com/show_bug.cgi?id=1889895 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2020-14779 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889271 external
https://www.cve.org/CVERecord?id=CVE-2020-14779 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14779 external
https://access.redhat.com/security/cve/CVE-2020-14781 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889274 external
https://www.cve.org/CVERecord?id=CVE-2020-14781 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14781 external
https://access.redhat.com/security/cve/CVE-2020-14782 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889290 external
https://www.cve.org/CVERecord?id=CVE-2020-14782 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14782 external
https://access.redhat.com/security/cve/CVE-2020-14792 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889280 external
https://www.cve.org/CVERecord?id=CVE-2020-14792 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14792 external
https://access.redhat.com/security/cve/CVE-2020-14796 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889697 external
https://www.cve.org/CVERecord?id=CVE-2020-14796 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14796 external
https://access.redhat.com/security/cve/CVE-2020-14797 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889717 external
https://www.cve.org/CVERecord?id=CVE-2020-14797 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14797 external
https://access.redhat.com/security/cve/CVE-2020-14803 self
https://bugzilla.redhat.com/show_bug.cgi?id=1889895 external
https://www.cve.org/CVERecord?id=CVE-2020-14803 external
https://nvd.nist.gov/vuln/detail/CVE-2020-14803 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781)\n\n* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782)\n\n* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792)\n\n* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797)\n\n* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803)\n\n* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779)\n\n* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* java-11-openjdk property java.vendor is \"N/A\" (BZ#1873388)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4316",
        "url": "https://access.redhat.com/errata/RHSA-2020:4316"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1873388",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873388"
      },
      {
        "category": "external",
        "summary": "1889271",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889271"
      },
      {
        "category": "external",
        "summary": "1889274",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889274"
      },
      {
        "category": "external",
        "summary": "1889280",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889280"
      },
      {
        "category": "external",
        "summary": "1889290",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889290"
      },
      {
        "category": "external",
        "summary": "1889697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889697"
      },
      {
        "category": "external",
        "summary": "1889717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889717"
      },
      {
        "category": "external",
        "summary": "1889895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889895"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4316.json"
      }
    ],
    "title": "Red Hat Security Advisory: java-11-openjdk security and bug fix update",
    "tracking": {
      "current_release_date": "2025-11-21T18:17:45+00:00",
      "generator": {
        "date": "2025-11-21T18:17:45+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "RHSA-2020:4316",
      "initial_release_date": "2020-10-22T19:41:52+00:00",
      "revision_history": [
        {
          "date": "2020-10-22T19:41:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-10-22T19:41:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-21T18:17:45+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
                  "product_id": "AppStream-8.0.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                "product": {
                  "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                "product": {
                  "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.9.11-0.el8_0?arch=ppc64le\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.src",
                "product": {
                  "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.src",
                  "product_id": "java-11-openjdk-1:11.0.9.11-0.el8_0.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.9.11-0.el8_0?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src"
        },
        "product_reference": "java-11-openjdk-1:11.0.9.11-0.el8_0.src",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le"
        },
        "product_reference": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)",
          "product_id": "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        },
        "product_reference": "java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64",
        "relates_to_product_reference": "AppStream-8.0.0.Z.E4S"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-14779",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889271"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14779"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889271",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889271"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14779",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14779",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14779"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862)"
    },
    {
      "cve": "CVE-2020-14781",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889274"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14781"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889274",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889274"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14781",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14781",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14781"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990)"
    },
    {
      "cve": "CVE-2020-14782",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889290"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14782"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889290",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889290"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14782",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14782",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14782"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995)"
    },
    {
      "cve": "CVE-2020-14792",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889280"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14792"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889280",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889280"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14792",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14792",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14792"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114)"
    },
    {
      "cve": "CVE-2020-14796",
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14796"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14796",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14796",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14796"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680)"
    },
    {
      "cve": "CVE-2020-14797",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889717"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14797"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889717",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889717"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14797",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14797",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14797"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)"
    },
    {
      "cve": "CVE-2020-14803",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "discovery_date": "2020-10-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1889895"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
          "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14803"
        },
        {
          "category": "external",
          "summary": "RHBZ#1889895",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889895"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14803",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14803",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14803"
        }
      ],
      "release_date": "2020-10-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-10-22T19:41:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
          "product_ids": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.src",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-demo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-jmods-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.9.11-0.el8_0.x86_64",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.ppc64le",
            "AppStream-8.0.0.Z.E4S:java-11-openjdk-src-1:11.0.9.11-0.el8_0.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…